Nobody should have to die because we didn’t apply a security patch…
was published on Kable, written by David Evans, director of policy and community for BCS, The Chartered Institute for IT.
I will let the article title pass as click bait, it may have been a editorial decision, but the thrust of the article is that peoples lives were placed at risk in the UK due to the recent WannaCrypt ransomware events affecting NHS institutions and many others around the world, and that ICT professionals are the point of failure.
The point that care shouldn't be affected by Cyber attacks that we have good solid published patches for is a reasonable one. However to paint a picture that this is a professional failure on the part of ICT staff and that it shows that ICT workers need to exercise the same sort of professional control over system as healthcare professional exercise in delivering care to patients is to my mind a very long bow. to quote part of the article:
So what’s the answer? Well, we need a visible, recognised cadre of accountable professionals working in IT (or informatics as they call it) in the NHS, and we need a visible, cadre of accountable professionals working in information security across the public and private sectors. Both having a cross-over, of course. We need those professionals to be self-governing, public-focused, but accountable individually and collectively to the public they serve. That’s why we have professional bodies, and this is the function that is performed by the General Medical Council, Royal College of Physicians and so on for doctors. For IT and security we have bodies like BCS, the IET, and a number of others. We have the structures, but until now it hasn’t been clear to the public and public institutions why this is so important.
The rest of the article further enforces that ICT needs to stand up as a profession. Now this is all laudable and it is a drum that BCS has long been banging and yes it is a factor, but is it a root cause or currently even a major determinant.
Do we know how to build secure systems as a industry - the answer is a qualified yes - no security system is perfect and well financed adversaries are a formidable threat that is very difficult to mitigate.
So if we know how to do it why are systems like those in healthcare not as well protected as we know how? The answer to that is - Security is a complex organisational responsibility. It involves a complex risk management estimation across our old friends Confidentiality, Integrity and Availability. These estimations normally need to be made at the senior executive level in an organisation as the costs are so high, not just in technology or tools which often are not that big a component but in things like:
- Effort involved to stay on top of patches and security issues
- Loss of availability of systems during patching and possible disruption due to unexpected "features" in the patch
- Willingness to upgrade systems regularly and deal with impacts on legacy systems
- Expending the time on staff training in security and updated systems
- Ensuring that there are adequate Disaster Recovery capabilities to deal with attacks that do cause harm
- Building environments with suitable micro-segmentation and functional limits to protect key information assets
- Developing the extensive situational awareness of normal state so we can quickly detect threat vectors active in environments
- and many others
Now the antipodes are far from the UK and maybe it is different but as a Health Informatician and then as a IT practitioner in more security conscious organisations I have found that the security posture is rarely set by the IT staff or indeed even the CIO or CISO. Security Posture is lead and promulgated by boards and senior leadership.
The things that make people sit up and take IT security seriously as an organisation are things like:
- Legislation like HIPPA or
- Standards to provide financial protection like PCI that must be met to enable you to trade i.e. a very strong financial incentive
- Government mandated protections like Australia Protective Security Policy Framework
There has to be a reason for organisations to act and even then as Target's breach many others show it is still possible to fail to take advice and act without due care despite appearing to be compliant with standards and regulation.
IT security is hard and it only happens to the level the organisation wants to support and at the level and risk and cost the organisations leadership is prepared to bear. ICT professionals need to understand the domain and work with ICT Security specialists to ensure leadership are properly briefed and informed and strategies are implemented according to leadership directive.
However the management of that risk is like any other business risk - it is the responsibility of the organisations leadership not the ICT staff, as ICT staff do not have a prescribing pad or the ability to write treatment plans that then a massive organisation like the NHS will then strive mightily to follow. We don't have that sort of authority in organisations and I am not convinced we should.
Even in health care individual practitioners do not decide how they wish to deal with Infection Control, that is determined by expert committees and senior leadership according to evidence based practise and risk calculations and then promulgated as hard "must do" policy. If health care institutions dealt with ICT Security as they do Infection Control and sanitation then I think the risk profile that WannaCrypt had to exploit would have been greatly different.
I agree with David that ICT professionals need to be just that professional, accountable and willing to speak truth to power - but the power has to be willing to listen.